Fig. 9From: Coordinated cyber-physical attack considering false overload of linesBus injection power distribution by attacking different linesBack to article page